1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zinaida [17]
3 years ago
5

Write a program that requests the user input a word, then prints every other letter of the word starting with the first letter.

Computers and Technology
1 answer:
alex41 [277]3 years ago
6 0

word = input("Enter a word: ")

for x in range(0, len(word), 2):

   print(word[x])

I hope this helps!

You might be interested in
Where does the computer store instructions and data that are needed frequently by the cpu?
Elden [556K]
L1 Cache

There other cache levels but the most frequently used data is put in L1d (d for data) and L1i (i for instructions).


3 0
4 years ago
What is the purpose of HTML?
Basile [38]
You can style and structure with it so it’s either one of those
3 0
3 years ago
Please help me, I'll give you 15 points.
babunello [35]
Yep same, i don’t know what to write abt it is jus saying what to write and now what abt
4 0
3 years ago
Briefly discuss what is the basic architecture of a computer system?<br>​
Cerrena [4.2K]

Answer:

From strictly a hardware aspect;

Explanation:

The basic architecture of a computer is the case (otherwise known as tower), the motherboard, and power supply unit. The case is used to house all of the necessary parts for the computer function properly. The motherboard will serve as the bridge between all other connections, and the power supply unit will deliver capable power to the rest of the system.

8 0
2 years ago
A data classification scheme is a formal access control methodology used to assign a level of availability to an information ass
photoshop1234 [79]

A data classification scheme is a formal access control methodology used to assign a level of availability to an information asset and thus restrict the number of people who can access is a FALSE statement.

Explanation :

  • The statemant given above will lead to a loss of confidentiality, hence it is false.
  • A loss of confidentiality is the unauthorized disclosure of information.
  • If a system suffers loss of confidentiality, then data has been disclosed to unauthorized individuals. This could be high level secret or proprietary data, or simply data that someone wasn't authorized to see

3 0
4 years ago
Other questions:
  • A. True <br> b. False: variables represent storage locations in the computer's memory.
    13·1 answer
  • 2a
    8·1 answer
  • How much does a tech person get each year?
    11·2 answers
  • What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typic
    14·1 answer
  • For a Windows laptop, what is the best way to save power when the computer will not be used for an extended period?
    14·2 answers
  • Ancler Corporation wants to calculate how much their profits were in the first quarter of the year. They should use a
    6·2 answers
  • Which of the following is productivity strategy for collaboration?
    6·1 answer
  • Police officers conducting traffic stops on minority drivers more than non-minority drivers is an example of what?
    8·1 answer
  • Which TWO objects are likely to have SSD chips in them?
    5·2 answers
  • What are the dominant InfoSec-related credentials used to document knowledge and/or experience?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!